Confidential Computing uses a hardware-based Trusted Execution Environment (TEE) to protect data and applications in-use.
By securing data when it is being processed, Confidential Computing can protect private data on untrusted infrastructure and prevent unauthorized access to sensitive workloads.
Now available to deploy at scale with public cloud providers and OEM hardware manufacturers, Confidential Computing represents a game-changing privacy enhancing technology that enables collaborative data processing, without compromising data privacy requirements.
This session will describe how Confidential Computing works and how it is being used within a range of different industry use-cases covering healthcare, financial services and defense applications.